Collects and categorizes Guardiumevents for easy searching, reportingand correlation with other data

–

Correlates database activity withQRadar network activity to detectanomalous and suspicious behavior.For example: Alert is issued whenmultiple failed logins to a databaseserver are followed by a successfullogin and accessing of credit cardtables, then followed by an FTPupload to a questionable external site.

Database vulnerability sharing

–

Pulls database vulnerability datafrom Guardium into QRadar AssetProfiles to get more complete assetdata for databases.

the use of, or otherwise related to,these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warrantiesorrepresentations from IBM or itssuppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materialsto IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product

release dates and/or capabilitiesreferenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors,

and are not intended to be acommitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services aretrademarks of the InternationalBusiness Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be

trademarks or service marks ofothers.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improperaccess from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage toor misuse of your systems, including to attack others. No IT system or product should be considered completely secure and nosingle product or security measurecan be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which willnecessarily involve additional operational procedures, and may require other systems, products or services to be most effective.

IBM DOES NOT WARRANTTHAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.